Social Media Malware: Determinants of Users Intention to Share Potentially Infected Posts
|
|
- Andrew Johns
- 6 years ago
- Views:
Transcription
1 Social Media Malware: Determinants of Users Intention to Share Potentially Infected Posts Emergent Research Forum Paper Sonia Camacho Universidad de los Andes Abstract Malware has become problematic in social networking sites (SNS), where users can click on links that come from legitimate users but that may be infected with non-authorized downloads. This may generate security risks for companies (e.g. unauthorized access to sensitive information), if employees use those social networks from their work devices. Considering the relevance of this phenomenon for organizations, this ERF paper explores the potential of malware infection from the point of view of the weakest link in security efforts: the user. This study proposes a theoretical model based on Theory of Reasoned Action that will aid in understanding the factors that determine a user s intention to share potentially infected content in a SNS. This model will be empirically validated using a survey-based study involving Facebook users, and structural equation modelling techniques. Keywords Social networking sites, malware, online sharing behavior. Introduction Malware is a short word for malicious software and it refers to software that is designed to cause damage or perform unwanted actions in a computer system (e.g. run a computer virus) (TechTerms.com, 2015). Malware has become problematic in social networking sites, where users may click on links that are sent by legitimate friends or acquaintances and that may come with infected non-authorized downloads (Everett, 2010). Sharing personal information on social networking sites increases the vulnerability of users and their possibility of falling victims to phishing (Jagatic, Johnson, Jakobsson, and Menczer 2007). In a study conducted on 2011, more than 50% of Information Technology (IT) practitioners surveyed indicated an increase of malware in their systems due to the use of social media, and more than 60% specified that social media represented a security risk to their organizations (Ponemon 2011 as cited in He 2012). Considering the relevance of this phenomenon to organizations, researchers have explored the psychological tactics (e.g. manipulating users greed or curiosity) employed by malware authors to lure users into opening malicious links, as well as the activities performed by malware once it is activated (e.g. fighting existing protection mechanisms) (Abraham and Chengalur-Smith 2010). Moreover, they have studied the mechanisms employed by organizations to address malware and other security risks derived from social networking sites (e.g. monitoring social networking sites usage, banning its use, having up-todate security software) (Everett 2010; He 2012). However, and considering that the user is the weakest link in security efforts, the strategies to address malware and other risks need to focus on the usage behavior of individuals (ISACA 2010 as cited in He 2012). This is a pressing issue considering that users may believe that the behaviors they are performing are not risky (Davinson and Sillence 2010). Therefore, the research objective of this study is to explore the motivations users have to click or share dubious links in social networking sites. Twenty-second Americas Conference on Information Systems, San Diego,
2 Theoretical Background and Research Model In order to achieve the proposed research objective, this study proposes a theoretical model based on Theory of Reasoned Action (briefly described below). Theory of Reasoned Action Theory of Reasoned Action (TRA) has been used widely in Information Systems (IS) studies that have sought to understand the adoption and use of IS (Hong, Kim, and Lee 2008). According to TRA, individuals performance of certain behaviors is determined by individuals intentions to carry out them, which in turn, are influenced by subjective norms and individuals attitude. The attitude toward a particular behavior is determined by a set of beliefs the individual holds about that behavior (Ajzen and Fishbein 1980). In the application of TRA to IS adoption studies, researchers have found inconsistent results in terms of the power of attitude to predict individuals behavior, and as such, this construct has been generally excluded from adoption models (Kroenung & Eckhardt, 2015). This theory is deemed suitable for this study, as it explores a user s intention to perform a particular behavior (i.e. clicking on a link or sharing a post) and its antecedents. Research Model and Hypotheses The proposed research model is based on the theoretical framework described above and shown in Figure 1. The constructs and hypotheses included in this model are described in detail below. Social norms H1+ Perceived usefulness of content H2+ Intention to click on link or share post Trust in SNS contacts H3- H4- Perceived vulnerability Figure 1. Proposed research model Social norms Social norms refer to individuals perceptions of what referent individuals or groups believe about a particular behavior. They are determined by individuals perceived expectations of specific others and individuals intention to comply with these expectations (Davis, Bagozzi, and Warshaw 1989). In the context of social networking sites (SNS), authors have found that individuals sharing behavior can be influenced by the behavioral patterns of their friends (Bakshy, Rosenn, Marlow, and Adamic 2012; Chakraborty, Vishik, and Rao 2013). Moreover, social norms have been found to influence individuals intentions to use Facebook (Błachnio, Przepiórka, and Rudnicka 2013) and individuals disclosure in SNS (Cheung, Lee, and Chan 2015). In light of these findings, it is expected that users will be more likely to click on a link or share a post if their friends have done so, or if they believe their friends expect them to do it (i.e. as a result of social influence). Thus, it is hypothesized that: H1: Social norms are positively related to the intention to click on a link or share a post Perceived usefulness of content Perceived usefulness refers to an individual s belief that using a particular IS will generate improvements in her or his job performance (Davis, Bagozzi, and Warshaw 1989). This construct has shown to be a strong determinant of intention to use an IS (Venkatesh, Morris, Davis, and Davis 2003). In the Twenty-second Americas Conference on Information Systems, San Diego,
3 knowledge sharing literature, Sussman and Siegal (2003) found that the usefulness of information provided by others (e.g. advice, recommendations) increases individuals likelihood of adopting that piece of information (e.g. to follow the advice). In the same vein, finding useful knowledge in online communities increases users intentions to seek and share knowledge in those communities (Park, Gu, Leung, and Konana 2014; Yu, Lu, and Liu 2010). Considering these findings, it is expected that individuals intention to click on a link or share a post will increase if they find the information contained in that link or post useful (e.g. it gives more knowledge to the user, it offers discounts or prizes). In formal terms: H2: Perceived usefulness of content is positively related to the intention to click on a link or share a post Perceived vulnerability Perceived vulnerability refers to the degree to which an individual believes a threat will occur to him/her (Lee, Larose, and Rifon 2008; Mohamed and Ahmad 2012, p. 2368). In Protection Motivation Theory studies, perceptions of vulnerability to a threat (e.g. a computer virus) are positively related to the intentions to adopt protective behaviors (e.g. installing a firewall) (see for example Lee, Larose, and Rifon 2008). In the context of SNS, perceptions of vulnerability to different risks (e.g. blackmailing, identity theft) have a negative impact on users disclosure of their information (Cheung, Lee, and Chan 2015). In the same vein, it is expected that users perception of vulnerability to potential risks (e.g. personal information loss, virus infections) involved in a link or post will lead to a protective behavior (i.e., avoiding to click on a link or to share a post). Thus, it is hypothesized that: H3: Perceived vulnerability is negatively related to the intention to click on a link or share a post Trust Trust can be defined as a person's willingness to be vulnerable to another, based on the expectation that her/his confidence will not be exploited (Mayer, Davis, and Schoorman 1995). In the context of SNS, users develop trusting beliefs towards other users based on perceptions of similarity (Krasnova, Spiekermann, Koroleva, and Hildebrand 2010). Those trusting beliefs help users mitigate the privacy concerns derived from disclosing their information in SNS (Cheung, Lee, and Chan 2015). In light of the previous findings, it is expected that trust in the source of information in a SNS (i.e. a SNS contact) will reduce the perceived vulnerability of a user to a potential threat in the link or post that s/he is considering to share. In formal terms: H4: Trust in social networking sites contacts is negatively related to perceived vulnerability Methodology This research will employ a survey-based study to collect data and test the hypothesized relationships. Participants in this study will be adults that are active Facebook users, and they will be recruited using a market research firm. Facebook is chosen as the SNS focus of this study because it is the leading social network worldwide, with 1.5 billion monthly active users (Statista, 2016). After obtaining consent, participants will be randomly assigned to one of three groups. Each group will be presented with a different scenario (a screenshot), in which a hypothetical Facebook News Feed will show one of the following: (1) a link containing a video of a celebrity, (2) a link offering extra-security features (e.g. antispam software), and (3) a post offering a free product. Those scenarios were chosen based on some of the emotions manipulated by malware authors to persuade users: curiosity (e.g. offering information about celebrities), fear (e.g. issuing a fraud alert), and greed (e.g. offering free things) (Abraham and Chengalur- Smith 2010). The scenarios will be pretested to make sure they are realistic and that participants have no difficulty in placing themselves in their assigned hypothetical scenario (following D'Arcy, Hovav, and Galletta 2009). In each of the groups, and after presenting the screenshots, participants will respond to the items measuring the five constructs included in the research model. In addition, other variables (e.g. age, gender, occupation, time with a Facebook account, and whether participants deem the content exhibited in the screenshot to be dangerous) will be collected to control for their potential influence on the endogenous constructs of the model. Ethics approval will be sought before data collection. Twenty-second Americas Conference on Information Systems, San Diego,
4 Measurement Instrument In order to measure the constructs in the proposed research model, previously validated scales will be adapted to the context of this study. Intention will be measured with a scale from Cheung and Lee (2012). Social norm and trust will be measured with scales from Cheung, Lee, and Chan (2015). Perceived usefulness of content will be measured with a scale from Sussman and Siegal (2003). Finally, perceived vulnerability will be measured with a scale from Mohamed and Ahmad (2012). Model Validation and Sample Size Structural Equation Modeling (SEM) will be used to validate the proposed model. In particular, Partial Least Squares (PLS) will be used as it is suitable for exploratory studies, like the one proposed (Gefen, Straub, and Boudreau 2000). In order to compare the differences among the three groups, the guidelines offered by Faul, Erdfelder, Lang, and Buchner (2007) to detect a medium size effect, with a power of 0.80, an alpha of 0.05, and 3 groups will be followed. According to these guidelines, the minimum number of participants that would need to be recruited is 53 per group (159 in total). In order to account for potential spoiled responses, a total of 180 participants will be recruited. Potential contributions and limitations From an academic standpoint, this is the first known study to address the issue of malware infection from the point of view of users motivations to share potentially malicious content in social networking sites. This study will also help to advance the Dark Side of Information Technology literature, by understanding the factors that make invidividuals vulnerable to the infection of malware while they interact with their SNS applications. From a practical perspective, an understanding of users motivations to share potentially malicious content will help organizations to design more effective user training programs aimed at reducing the threat of malware disseminated through social media. This study has some limitations. First, due to its focus on only one SNS, its results may not be generalizable to other SNS with different characteristics (e.g. Twitter and its shortened links). Second, the proposed research model does not contemplate motivations tied to individual differences or cultural factors. These elements may be included in future research studies. References Abraham, S., & Chengalur-Smith, I An overview of social engineering malware: Trends, tactics, and implications, Technology in Society (32), pp Ajzen, I., & Fishbein, M Understanding Attitudes and Predicting Social Behavior, Englewood Cliffs, NJ: Prentice-Hall, Inc. Bakshy, E., Rosenn, I., Marlow, C., & Adamic, L The role of social networks in information diffusion, in Proceedings of the 21st international conference on WWW (pp ). ACM. Błachnio, A., Przepiórka, A., and Rudnicka, P Psychological Determinants of Using Facebook: A Research Review, International Journal of Human-Computer Interaction (29), pp Chakraborty, R., Vishik, C., & Rao, R Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing, Decision Support Systems, pp Cheung, C. M., & Lee, M. K What drives consumers to spread electronic word of mouth in online consumer-opinion platforms, Decision Support Systems (53), pp Cheung, C., Lee, Z. W., & Chan, T. K Self-disclosure in social networking sites: The role of perceived cost, perceived benefits and social influence, Internet Research (25:2), pp D'Arcy, J., Hovav, A., & Galletta, D User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach, Information Systems Research (20:1), pp Twenty-second Americas Conference on Information Systems, San Diego,
5 Davinson, N., & Sillence, E It won't happen to me: promoting secure behaviour among internet users, Computers in Human Behavior (26:6), pp Davis, F. D., Bagozzi, R. P., & Warshaw, P. R User Acceptance of Computer Technology: A Comparison of Two Theoretical Models, Management Science (35:8), pp Everett, C Social media: opportunity or risk?, Computer Fraud & Security (June), pp Faul, F., Erdfelder, E., Lang, A.-G., & Buchner, A G* Power 3: A flexible statistical power analysis program for th social, behavioral, and biomedical sciences, Behavior Research Methods (39:2), pp Gefen, D., Straub, D. W., & Boudreau, M. C Structural Equation Modeling and Regression: Guidelines for Research and Practice, Communications of the Association for Information Systems. He, W A review of social media security risks and mitigation techniques, Journal of Systems and Information Technology (14:2), pp Hong, S., Kim, J., & Lee, H Antecedents of use-continuance in information systems: toward an integrative view, Journal of Computer Information Systems (Spring), pp ISACA Top five social media risks for business: new ISACA white paper. Retrieved from Jagatic, T., Johnson, N., Jakobsson, M., & Menczer, F Social phishing, Communications of the ACM (50), pp Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T Online social networks: why we disclose, Journal of Information Technology (25:2), Kroenung, J., & Eckhardt, A The attitude cube - A three-dimensional model of situational factors in IS adoption and their impact on the attitude-behavior relationship, Information & Management (52), pp Lee, D., Larose, R., & Rifon, N Keeping our network safe: A model of online protection behavior, Behaviour and Information Technology (27:5), pp Mayer, R. C., Davis, J. H., & Schoorman, F. D An Integrative Model of Organizational Trust, Academy of Management Review (20:3), pp Mohamed, N., & Ahmad, I. H Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia, Computers in Human Behavior (28), pp Park, J. H., Gu, B., Leung, A. C., & Konana, P An investigation of information sharing and seeking behaviors in online investment communities, Computers in Human Behavior (31), pp Ponemon Ponemon Institute Research Report: Global Survey on Social Media Risks Survey of IT & IT Security Practitioners. Statista. January, Leading social networks worldwide as of January 2016, ranked by number of active users (in millions). Retrieved from Sussman, S. W., & Siegal, W. S Informational Influence in Organizations: An Integrated Approach to Knowledge Adoption, Information Systems Research (14:1), pp TechTerms.com Malware. Retrieved from Venkatesh, V., Morris, M., Davis, G., & Davis, F User Acceptance of Information Technology: Toward a Unified View, MIS Quarterly (27:3), pp Yu, T.-K., Lu, L.-C., & Liu, T.-F Exploring factors that influence knowledge sharing behavior via weblogs, Computers in Human Behavior (26:1), Twenty-second Americas Conference on Information Systems, San Diego,
Knowledge of Security Protocols and Acceptance of E-commerce
Knowledge of Security Protocols and Acceptance of E-commerce Sumendra Singh, Faculty of Business and IT, Webster University, Thailand. E-mail: singh89sumendra@gmail.com Leslie Klieb, Faculty of Business
More informationAn Analysis of Social Networks Usage for Information Communication in Business Organization
An Analysis of Social Networks Usage for Information Communication in Business Organization Gamonkwan Phuk-intr Chulalongkorn Business School, Chulalongkorn University, Thailand. Kanibhatti Nitirojntanad
More informationKnowledge Management System Adoption and Practice in Taiwan Life Insurance Industry: Analysis via Partial Least Squares
Association for Information Systems AIS Electronic Library (AISeL) PACIS 2007 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2007 Knowledge Management System Adoption and Practice in
More informationInformation Security Policy Compliance: A User Acceptance Perspective
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2011 Proceedings Midwest (MWAIS) 5-20-2011 Information Security Policy Compliance: A User Acceptance Perspective Ahmad Al-Omari,
More informationThe Technology Acceptance Model for Competitive Software Products
The Technology Acceptance Model for Competitive Software Products Hock Chuan CHAN Department of Information Systems National University of Singapore chanhc@comp.nus.edu.sg Jing YANG Department of Information
More informationThe Influence of Individual-level Cultural Orientation on ERP System Adoption
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004 The Influence of Individual-level Cultural Orientation
More informationCONSUMER ACCEPTANCE OF TRUSTWORTHY E- COMMERCE: AN EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL
CONSUMER ACCEPTANCE OF TRUSTWORTHY E- COMMERCE: AN EXTENSION OF TECHNOLOGY ACCEPTANCE MODEL Muhammad Dharma Tuah Putra Nasution,Universitas Pembangunan Panca Budi Adi Anuar Azmin,Universiti Malaysia Perlis
More informationFactors Affecting the Intention to Use e-marketing: A case Study among Students in Jordan
Vol. 7, No.1, January 2017, pp. 322 328 E-ISSN: 2225-8329, P-ISSN: 2308-0337 2017 HRMARS www.hrmars.com Factors Affecting the Intention to Use e-marketing: A case Study among Students in Jordan Farah Hanna
More informationImpact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi- Cultural View
Association for Information Systems AIS Electronic Library (AISeL) WISP 2012 Proceedings Pre-ICIS Workshop on Information Security and Privacy (SIGSEC) Winter 12-15-2012 Impact of Protection Motivation
More informationThe Effect of the Consumers Innovativeness and Self-efficacy on Diffusion of Innovative Technology
, pp.234-238 http://dx.doi.org/10.14257/astl.2016.129.46 The Effect of the Consumers Innovativeness and Self-efficacy on Diffusion of Innovative Technology Hye-young Oh 1 1 Dept. of Computer Information
More informationMobile Commerce Usage: Application of Theory of Reasoned Action (TRA) and Technology Acceptance Model (TAM)
World Journal of Social Sciences Vol. 5. No. 2. April 2015 Issue. Pp. 41 50 Mobile Commerce Usage: Application of Theory of Reasoned Action (TRA) and Technology Acceptance Model (TAM) Shalini Wunnava *
More informationEXPLORING THE NEGATIVE SIDE OF SOCIAL NETWORKING SITES: THE ROLE OF PRIVACY RISK AND TRUSTWORTHINESS
EXPLORING THE NEGATIVE SIDE OF SOCIAL NETWORKING SITES: THE ROLE OF PRIVACY RISK AND TRUSTWORTHINESS 1 DAUW-SONG ZHU, 2 ZUI CHIH LEE, 3 CHEN-WEN CHUNG 1,3 Department of Business Administration, National
More informationThe Effects of Internet Experience and Attitudes Toward Privacy and Security on Internet Purchasing
Association for Information Systems AIS Electronic Library (AISeL) ECIS 2000 Proceedings European Conference on Information Systems (ECIS) 2000 The Effects of Experience and Attitudes Toward Privacy and
More informationIntegrating Trust in Electronic Commerce with the Technology Acceptance Model: Model Development and Validation
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) December 2001 Integrating Trust in Electronic Commerce with
More informationPrediction of User Acceptance and Adoption of Smart Phone for Learning with Technology Acceptance Model
Prediction of User Acceptance and Adoption of Smart Phone for Learning with Technology Acceptance Model 1 Yong-Wee Sek, 2 Siong-Hoe Lau, 2 Kung-Keat Teoh, 3 Check-Yee Law 1 Shahril Bin Parumo 1 Faculty
More informationAn Integrative Model of Clients' Decision to Adopt an Application Service Provider
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2003 Proceedings Americas Conference on Information Systems (AMCIS) December 2003 An Integrative Model of Clients' Decision to Adopt
More informationHow Loyal are You? Continuance Intention and Word of Mouth in Free/Libre Open Source Software
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2009 Doctoral Consortium Americas Conference on Information Systems (AMCIS) 2009 How Loyal are You? Continuance Intention and Word
More information(Full Paper Submission) Yan Chen Auburn University at Montgomery
DECISION SCIENCES INSTITUTE Influence of Security Concerns, Privacy Concerns, and Exchange Benefits on Mobile Commerce Adoption: A Social Exchange Perspective (Full Paper Submission) Yan Chen Auburn University
More informationINFLUENCE FACTORS ON INTENTION TO USE MOBILE BANKING
INFLUENCE FACTORS ON INTENTION TO USE MOBILE BANKING 1 KYUNGTAG LEE, 2 JEONGWOO KIM, 3 MIJIN NOH 1,2 Yeungnam University, 3 Kyungpook National University E-mail: 1 mykr21@gmail.com, 3 yomydragon@naver.com,
More informationEnd-User Acceptance Of E-Government Services In an Indonesia Regency
End-User Acceptance Of E-Government Services In an Indonesia Regency Deden Witarsyah Mohd Farhan MD Fudzee Mohamad Aizi Bin Salamat Information System Department Department of Multimedia Department of
More informationInformation Adoption Model, a Review of the Literature
Information Adoption Model, a Review of the Literature Yu Wang Abstract Along with the popularity of electronic word of mouth (ewom) communication, the issue about how individuals adopt online information
More informationUser Acceptance of E-Government Services
Association for Information Systems AIS Electronic Library (AISeL) PACIS 2007 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2007 User Acceptance of E-Government Services Ying-Hsun
More informationInternational Academic Institute for Science and Technology. Management. Vol. 3, No. 12, 2016, pp ISSN
International Academic Institute for Science and Technology International Academic Journal of Accounting and Financial Management Vol. 3, No. 12, 2016, pp. 30-37. ISSN 2454-2350 International Academic
More informationPROJECT Introduction Over the recent years, government use of the Internet as a platform to provide services to citizens has grown significantly. One of the major priorities already identified by
More informationPERCEPTION TOWARDS ENTERTAINMENT VALUE OF USERS BY SOCIAL NETWORKING SITES AN EMPIRICAL STUDY
PERCEPTION TOWARDS ENTERTAINMENT VALUE OF USERS BY SOCIAL NETWORKING SITES AN EMPIRICAL STUDY DR. DHIRAJ JAIN*; MS. FARHAT FATIMA SADRIWALA** *ASSOCIATE PROFESSOR, PACIFIC INSTITUTE OF MANAGEMENT, UDAIPUR
More informationInformation Security Policies Compliance: The Role of
Information Security Policies Compliance: The Role of Organizational Punishment Mohammad I. Merhi Department of Computer Information Systems & Quantitative Methods College of Business Administration University
More informationUsing User-Generated Content when travelers make travel plans: A Theory of Planned Behavior perspective
Using User-Generated Content when travelers make travel plans: A Theory of Planned Behavior perspective Luiz Augusto Machado Mendes Filho 1 Felix B. Tan 2 Annette Mills 3 Abstract: User-Generated Content
More informationSocial Commerce Adoption Model
Association for Information Systems AIS Electronic Library (AISeL) UK Academy for Information Systems Conference Proceedings 2012 UK Academy for Information Systems Spring 3-27-2012 Social Commerce Adoption
More informationINVESTIGATION OF TRUST, PERCEIVE SAFETY. PERCEIVED EASE OF USE, INCOME, GENDER AND RACE ON BOTTLED WATER USE
INVESTIGATION OF TRUST, PERCEIVE SAFETY. PERCEIVED EASE OF USE, INCOME, GENDER AND RACE ON BOTTLED WATER USE Anh Ta University of North Texas College of Business 1155 Union Circle #311160 Denton, TX 76203-5017
More informationUtilizing the Technology Acceptance Model to Assess the Employee Adoption of Information Systems Security Measures
Publications 2010 Utilizing the Technology Acceptance Model to Assess the Employee Adoption of Information Systems Security Measures Cynthia M. Jones Nova Southeastern University Richard V. McCarthy Quinnipiac
More informationWhy People Buy Virtual Items in Virtual Worlds with Real Money
Why People Buy Virtual Items in Virtual Worlds with Real Money Yue Guo University of East Anglia Stuart Barnes University of East Anglia Abstract Virtual worlds, such as Second Life and Everquest, have
More informationExamining the Factors Influencing Purchase Intention of Smartphones in Hong Kong
Contemporary Management Research Pages 213-224, Vol. 12, No. 2, June 2016 doi:10.7903/cmr.13836 Examining the Factors Influencing Purchase Intention of Smartphones in Hong Kong Mei Mei Lau The Hong Kong
More informationToward Developing a Theory of End User Information Security Competence
Toward Developing a Theory of End User Information Security Competence Canchu Lin University of Toledo Canchu.lin@rockets.toledo.edu Anand S. Kunnathur University of Toledo anand.kunnathur@utoledo.edu
More informationThis is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail.
This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. Author(s): Makkonen, Pekka; Schutskoff, Sanna Title: Personal branding
More informationTechnology Acceptance Analysis of Local Government Tourism Website
African Journal of Business Management Vol. 6(49), pp. 11891-11895, 12 December, 2012 Available online at http://www.academicjournals.org/ajbm DOI: 10.5897/AJBM10.1590 ISSN 1993-8233 2012 Academic Journals
More informationExploring Chinese Users Acceptance of Social Commerce Sites
Exploring Chinese Users Acceptance of Social Commerce Sites Jia Shen Department of Information Systems and Supply Chain Management College of Business Administration Rider University Lawrenceville, NJ,
More informationGlobal Media Journal Spring 2013 Harden & Al Beayeyz 1
Global Media Journal Spring 2013 Harden & Al Beayeyz 1 A COMPARATIVE ANALYSIS OF SOCIAL NETWORKING SITE USE IN TWO DISTINCT CULTURES: EVALUATING THE IT-CULTURE CONFLICT Gina Harden, gina.harden@unt.edu
More informationToward An Understanding of the Behavioral Intention to Use Mobile Banking Services
Association for Information Systems AIS Electronic Library (AISeL) PACIS 2004 Proceedings Pacific Asia Conference on Information Systems (PACIS) December 2004 Toward An Understanding of the Behavioral
More informationJournal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/)
Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, December 2007, vol. 12, no.3 (http://www.arraydev.com/commerce/jibc/)
More informationResponding to Negative Social Media Content: an Organizational Identification Perspective
Responding to Negative Social Media Content: an Organizational Identification Perspective Emergent Research Forum Paper Abstract Quynh N. Nguyen University of North Texas Quynh.Nguyen@unt.edu Anna Sidorova
More informationAPPLYING A MODEL OF THE DYNAMICS OF PURCHASING FROM VIRTUAL STORES TO UAE
APPLYING A MODEL OF THE DYNAMICS OF PURCHASING FROM VIRTUAL STORES TO UAE, Department of MIS, American University of Sharjah, Sharjah, UAE 26666 Rbarkhi@aus.edu (On leave from Virginia Tech, USA) Abstract
More informationAnalyzing the impact of social media on consumer attitudes toward the brand and their intention to purchase
Global Media Journal, Persian Edition Fall and winter 402, Volume 9, Issue 4 Received in: /9//90/60 Accepted in: 6/90/90/6 Analyzing the impact of social on consumer attitudes toward the brand and their
More informationPurpose of Using Social Networks
American International Journal of Contemporary Research Vol. 2 No. 3; March 2012 Purpose of Using Social Networks Abstract William Barnett, PhD Associate Professor of Computer Information Systems College
More informationExploring Technological Factors Affecting the Adoption of M-Commerce in Jordan
Australian Journal of Basic and Applied Sciences, 7(6): 395-400, 2013 ISSN 1991-8178 Exploring Technological Factors Affecting the Adoption of M-Commerce in Jordan 1 Feras Fares Al Mashagba, 2 Eman Fares
More informationLike A Global Endorsement. How Clicking Like Influences Facebook Users Brand Recall and Future Purchasing Intentions
Like A Global Endorsement. How Clicking Like Influences Facebook Users Brand Recall and Future Purchasing Intentions Ronda Mariani Saint Leo University Derek Mohammed Saint Leo University Social media
More informationA study on the relationship of contact service employee s attitude and emotional intelligence to coping strategy and service performance
, pp.75-79 http://dx.doi.org/10.14257/astl.2014.70.18 A study on the relationship of contact service employee s attitude and emotional intelligence to coping strategy and service performance Kim, Gye Soo
More informationATTITUDES AND YOUNG CONSUMERS ORGANIC FOOD PURCHASING INTENTIONS
Journal of Science Ho Chi Minh City Open University VOL. 19 (3) 2016 October/2016 55 ATTITUDES AND YOUNG CONSUMERS ORGANIC FOOD PURCHASING INTENTIONS NGUYEN KIM NAM Ho Chi Minh City Industry and Trade
More informationA STUDY ON KNOWLEDGE BASE TRUST IN ADOPTING E-TRANSACTION
A STUDY ON KNOWLEDGE BASE TRUST IN ADOPTING E-TRANSACTION Hsiang-Yung Feng 1, Ting-Yuan Chang 2 1 National Pingtung Institute of Commerce, 2 National Cheng Kung University (TAIWAN) E-mails:hyfeng@npic.edu.tw,
More informationMEASUREMENT OF DISCONFIRMATION IN ONLINE PURCHASING BEHAVIOR
MEASUREMENT OF DISCONFIRMATION IN ONLINE PURCHASING BEHAVIOR Chinho Lin, Institute of Information Management of National Cheng Kung University, Taiwan R.O.C. Email: linn@mail.ncku.edu.tw Yu-Huei Wei, Department
More informationCopyright subsists in all papers and content posted on this site.
Student First Name: Mubarak Student Second Name: Alruwaie Copyright subsists in all papers and content posted on this site. Further copying or distribution by any means without prior permission is prohibited,
More informationUSER ACCEPTANCE OF INFORMATION TECHNOLOGY ACROSS CULTURES
USER ACCEPTANCE OF INFORMATION TECHNOLOGY ACROSS CULTURES Kakoli Bandyopadhyay Lamar University, P.O. Box 10033, Beaumont, TX 77710 Phone: (409) 880-8627, Fax: (409) 880-8235 E-Mail: kakoli.bandyopadhyay@lamar.edu
More informationAvailable online at ScienceDirect. Procedia Economics and Finance 27 ( 2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Economics and Finance 27 ( 2015 ) 567 573 22nd International Economic Conference IECS 2015 Economic Prospects in the Context of Growing
More informationTHE ADOPTION AND USE OF INTERNET BANKING BY MALAYSIAN CONSUMERS: AN EMPIRICAL INVESTIGATION
THE ADOPTION AND USE OF INTERNET BANKING BY MALAYSIAN CONSUMERS: AN EMPIRICAL INVESTIGATION Chee Leong LIM Taylor s Business School, Taylor s College, Subang Jaya, Selangor. E-mail: lim.cheeleong@taylors.edu.my
More informationOrganization Culture Dimensions as Antecedents of Internet Technology Adoption
Organization Culture Dimensions as Antecedents of Internet Technology Adoption Subhasish Dasgupta 1 and Babita Gupta 2 1 George Washington University, 2115 G Street, NW, Suite 515, Washington, DC 20052,
More informationDeterminants of User s Intention to Use MMS: A Pilot Study
Determinants of User s Intention to Use MMS: A Pilot Study Zhaohui Chen Department of Information Systems, City University of Hong Kong Tel: (852) 2788-7421,Fax: (852) 2788-8694 Email: ischen@is.cityu.edu.hk
More informationEvaluating Supply Chain Context-Specific Antecedents of Post-Adoption Technology Performance
Association for Information Systems AIS Electronic Library (AISeL) SIGHCI 2005 Proceedings Special Interest Group on Human-Computer Interaction 2005 Evaluating Supply Chain Context-Specific Antecedents
More informationIncorporating Perceived Risk Into The Diffusion Of Innovation Theory For The Internet And Related Innovations
Incorporating Perceived Risk Into The Diffusion Of Innovation Theory For The Internet And Related Innovations Zakaria I. Saleh. Yarmouk University, Jordan DrZaatreh@netscape.net ABSTRACTS Despite the high
More informationInvestigating Social Influence on Acceptance of Executive Information Systems: A UTAUT Framework Approach
Association for Information Systems AIS Electronic Library (AISeL) SAIS 2007 Proceedings Southern (SAIS) 3-1-2007 Investigating Social Influence on Acceptance of Executive Information Systems: A UTAUT
More informationAn investigation on the Acceptance of Facebook by Travellers for Travel Planning
An investigation on the Acceptance of Facebook by Travellers for Travel Planning Nina Enter, Eleni Michopoulou, School of Culture and Lifestyle University of Derby, Buxton, UK N.Enter1@unimail.derby.ac.uk
More informationTPB (Ajzen, 1991), TAM (Davis et al., 1989) Topic: E-filing
TPB (Ajzen, 1991), TAM (Davis et al., 1989) Topic: E-filing Perceived usefulness Attitude Intention Ease of use Perceived behavioral control Subjective norm Introduction Over the recent years, government
More informationMotivating Employees to Comply with Information Security Policies
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2016 Proceedings Midwest (MWAIS) Spring 5-19-2016 Motivating Employees to Comply with Information Security Policies David Sikolia
More informationAn Examination of Privacy Concerns and Trust Entities in Determining Willingness to Disclose Personal Information on a Social Networking Site
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2010 Proceedings Americas Conference on Information Systems (AMCIS) 8-2010 An Examination of Privacy Concerns and Trust Entities
More informationThe Role of National Culture and Gender on Information Elements in E-commerce: A Pilot Study on Trust
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004 The Role of National Culture and Gender on Information
More informationApplication of Value-based Adoption Model to Analyze SaaS Adoption Behavior in Korean B2B Cloud Market
Application of Value-based Adoption Model to Analyze SaaS Adoption 1 Hong-Kyu Kwon, 2 Kwang-Kuyu Seo 1, First Author Department of Industrial & Management Engineering, Namseoul University, hongkyuk@nsu.ac.kr
More informationVirtual Community of Consumers: Why People are Willing to Contribute?
Virtual Community of Consumers: Why People are Willing to Contribute? Cindy M. Y. Cheung Department of Information Systems City University of Hong Kong iscin@cityu.edu.hk Sarah P.W. Shek Department of
More informationSwitching Behavior in Social Networking Sites:
Association for Information Systems AIS Electronic Library (AISeL) CONF-IRM 2011 Proceedings International Conference on Information Resources Management (CONF-IRM) 6-2011 Switching Behavior in Social
More informationWill Insurance Brokers Use Mobile Insurance Service Platform: An Integration of UTAUT and TTF
Will Insurance Brokers Use Mobile Insurance Service Platform: An Integration of UTAUT and TTF Research-in-Progress Yi-Ming Tai National Pingtung Institute of Commerce ymtai@npic.edu.tw Yi-Cheng Ku Providence
More informationManagement Science Letters
Management Science Letters 3 (2013) 1307 1314 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl An empirical study on different factors influencing
More informationDETERMINANTS OF GREEN PURCHASE BEHAVIOUR AMONG YOUNG CONSUMERS: AN ONLINE PERSPECTIVE
DETERMINANTS OF GREEN PURCHASE BEHAVIOUR AMONG YOUNG CONSUMERS: AN ONLINE PERSPECTIVE Adeline Kok Li-Ming Sunway University, Malaysia Teoh Boon Wai Green Possibilities Frontier, Malaysia ABSTRACT Consumers
More informationInformation Sharing on Social Networking Websites: Antecedents and Consequences of Trust
Information Sharing on Social Networking Websites: Antecedents and Consequences of Trust Completed Research Paper Mohammad Salehan Seyed Mohammadreza Mousavizadeh Kashipaz College of Business College of
More informationA Model of Sustainable Trust in B2C E-Markets
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) December 2001 A Model of Sustainable Trust in B2C E-Markets
More informationFactors Affecting Malaysian young consumers online purchase intention in social media websites
Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 40 ( 2012 ) 326 333 Factors Affecting Malaysian young consumers online purchase intention in social media websites See
More informationIntroduction. pulled into traveling by internal and external factors (Crompton, 2003). Push factors are more
The effects of motivation and satisfaction of college football tourist on revisit and recommendation: a structural model Erinn D. Tucker School of Hotel and Restaurant Administration Oklahoma State University
More informationFactors Influencing Electronic Government Adoption: Perspectives Of Less Frequent Internet Users Of Pakistan
Factors Influencing Electronic Government Adoption: Perspectives Of Less Frequent Internet Users Of Pakistan Farooq Alam Khan, Basheer Ahmad Abstract: Much literature on electronic government services
More informationPerceived risk of security and privacy in online shopping: A study of Malaysia context
Perceived risk of security and privacy in online shopping: A study of Malaysia context Marzieh Zendehdel 1, Laily Hj Paim (Corresponding author) 2 1. Department of Resource Management and Consumer Studies,
More informationAGE DIFFERENCES IN BEHAVIORAL INTENTION TO USE INTERNET MARKETING: A COMPARATIVE STUDY BETWEEN MALAYSIAN AND TAIWANESE
International Journal of Business and Society, Vol. 16 No. 3, 2015, 386-396 AGE DIFFERENCES IN BEHAVIORAL INTENTION TO USE INTERNET MARKETING: A COMPARATIVE STUDY BETWEEN MALAYSIAN AND TAIWANESE Salmi
More informationFrequency of Usage: The Impact of Technology Acceptance Factors versus Social Factors
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2011 Proceedings - All Submissions 8-5-2011 Frequency of Usage: The Impact of Technology Acceptance Factors versus Social Factors
More informationTowards a Theory of Trusted Performance in Software Development Projects
Communications of the IIMA Volume 12 Issue 1 Article 3 2012 Towards a Theory of Trusted Performance in Software Development Projects Jim Jenkins Seattle Pacific University Gerhard Steinke Seattle Pacific
More informationInvestigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model
Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model Full Paper Javad Abed Gurpreet Dhillon Virginia Commonwealth University Virginia Commonwealth
More informationResearch on the Willingness to Accept Mobile Internet Advertising Based on Customer Perception---A Case of College Students
Association for Information Systems AIS Electronic Library (AISeL) WHICEB 2017 Proceedings Wuhan International Conference on e-business Summer 5-26-2017 Research on the Willingness to Accept Mobile Internet
More informationInternet Banking: Enablers and Inhibitors for Developing Economies A Study of Potential Users in Jamaica Completed Research Paper
Internet Banking: Enablers and Inhibitors for Developing Economies A Study of Potential Users in Jamaica Completed Research Paper Annette M. Mills University of Canterbury Department of Accounting and
More informationThe Role of Buying Center Members Individual Motivations for the Adoption of Innovative Hybrid Offerings
The Role of Buying Center Members Individual Motivations for the Adoption of Innovative Hybrid Offerings - The Case of Battery Electric Vehicles in Corporate Fleets This paper investigates the adoption
More informationA Study on Users Intention of Using Mobile Payment
A Study on Users Intention of Using Mobile Payment 1 Hsio-Min Wang, 2 Bolortsetseg Idertsog 1 Professor, Department of Business Administration DaYeh University, Taiwan, 2 Graduate Student, Department of
More informationA Methodological Analysis of User Technology Acceptance
A Methodological Analysis of User nology Acceptance Heshan Sun School of Information Studies Syracuse University hesun@syr.edu Abstract The majority of research on user technology acceptance, e.g. technology
More information36
35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 Agarwal, R., & Prasad, J. (1997). The role of innovation characteristics and perceived voluntariness in the acceptance of information
More informationEURASIAN JOURNAL OF SOCIAL SCIENCES
Eurasian Journal of Social Sciences, 1(2), 2013, 46-51 EURASIAN JOURNAL OF SOCIAL SCIENCES http://www.econjournals.net PERSONALITY TRAITS AS FACTORS AFFECTING E-BOOK ADOPTION AMONG COLLEGE STUDENTS: DOES
More informationUSER ACCEPTANCE OF E-COMMERCE TECHNOLOGY: A META-ANALYTIC COMPARISON OF COMPETING MODELS
USER ACCEPTANCE OF E-COMMERCE TECHNOLOGY: A META-ANALYTIC COMPARISON OF COMPETING MODELS Yayla, Ali, Florida Atlantic University, 777 Glades Road, Boca Raton, FL 33431, USA, ayayla@fau.edu Hu, Qing, Florida
More informationPredictors of e-government Adoption in Mauritius: An Extended version of the Technology Adoption Model (TAM) Mahadeo, J, D and Wastell D, G
Predictors of e-government Adoption in Mauritius: An Extended version of the Technology Adoption Model (TAM) Mahadeo, J, D and Wastell D, G Introduction Acceptance of technology by users has obtained widespread
More informationQuality of Usage as a Neglected Aspect of Information Technology Acceptance
Quality of Usage as a Neglected Aspect of Information Technology Acceptance Birte Autzen Department of General Management and Information Systems Prof. Dr. Armin Heinzl University of Mannheim 68131 Mannheim
More informationThe Credibility of Saudi Media Institution Sites through Social Media from the Perspectives of Saudi Youth
The Credibility of Saudi Media Institution Sites through Social Media from the Perspectives of Saudi Youth Dr. Falah Amer Aldahmashi Faculty of Arts Department of Communication and Media King Faisal University
More informationUser acceptance of e-commerce technology: a meta-analytic comparison of competing models
Iowa State University From the SelectedWorks of Qing Hu June, 2007 User acceptance of e-commerce technology: a meta-analytic comparison of competing models Ali Yayla, Florida Atlantic University Qing Hu,
More informationFactors Affecting Online Customer-to-Customer Purchase Intention: A Study of Indonesian Customers
th The 7 Smart Collaboration for Business in Technology and Information Industries 2016 Factors Affecting Online Customer-to-Customer Purchase Intention: A Study of Indonesian Customers Andi Muhammad Iqbal
More informationEffect of Determinants of E-Retailing on Customer Satisfaction: Empirical evidences from India
DOI : 10.18843/ijms/v5iS3/05 DOIURL :http://dx.doi.org/10.18843/ijms/v5is3/05 Effect of Determinants of E-Retailing on Customer Satisfaction: Empirical evidences from India Rashmi Dang, Phd Research Scholar,
More informationWHY ARE CONSUMERS WILLING TO PAY FOR PRIVACY? AN APPLICATION OF THE PRIVACY-FREEMIUM MODEL TO MEDIA COMPANIES
WHY ARE CONSUMERS WILLING TO PAY FOR PRIVACY? AN APPLICATION OF THE PRIVACY-FREEMIUM MODEL TO MEDIA COMPANIES Complete Research Schreiner, Michel, Ludwig-Maximilians-Universität München, Munich, Germany,
More informationEvaluation of Future Mobile Services Based on the Technology Acceptance Model
Association for Information Systems AIS Electronic Library (AISeL) ECIS 2008 Proceedings European Conference on Information Systems (ECIS) 2008 Evaluation of Future Services Based on the Technology Acceptance
More informationA Comprehensive Multimedia Marketing Strategy to Effectively Disseminate Fire Science Information. Presented by: John Diaz and Toddi Steelman, Ph.D.
A Comprehensive Multimedia Marketing Strategy to Effectively Disseminate Fire Science Information Presented by: John Diaz and Toddi Steelman, Ph.D. Outline of Presentation Perception of Fire Tools for
More informationThe Effect of Accounting Information Systems in Accounting
The Effect of Accounting Information Systems in Accounting Awosejo, O.J 1, Kekwaletswe, R, M 2, Pretorius, P 3 and Zuva, T 4 Abstracts Generally, ICT have improved the quality of professional services
More informationThe Compositions, Antecedents and Consequences of Brand Loyalty. Chien-An Lin, National Kaohsiung University of Hospitality and Tourism, Taiwan
The Compositions, Antecedents and Consequences of Brand Loyalty Chien-An Lin, National Kaohsiung University of Hospitality and Tourism, Taiwan Asian Conference on Psychology and Behavioral Sciences 2015
More informationAn empirical study on predicting user acceptance of e-shopping on the Web
Information & Management 41 (2004) 351 368 An empirical study on predicting user acceptance of e-shopping on the Web Hung-Pin Shih * Information Management Department, Hsuan Chuang University, Taiwan,
More informationToward Modeling the Effects of Cultural Dimension on ICT Acceptance in Indonesia
Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 65 ( 2012 ) 833 838 International Congress on Interdisciplinary Business and Social Science 2012 (ICIBSoS 2012) Toward
More information